An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.
How easy to exploit
Severity of consequences
Likelihood of exploitation in next 30 days